{"title":"Cybersecurity Students’ Interest in Government Careers: Impact of Demographic Characteristics and Job Dynamics","authors":"Brian K. Payne, Ida Oesteraas, David C. May","doi":"10.1080/19361610.2023.2277513","DOIUrl":"https://doi.org/10.1080/19361610.2023.2277513","url":null,"abstract":"A critical shortage of cybersecurity talent exists in the United States. The lack of personnel has resulted in increased competition for the cybersecurity professionals. As the field of cybersecuri...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138504949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack Model for Generic Intelligent Systems","authors":"Sirapat Boonkrong","doi":"10.1080/19361610.2023.2283666","DOIUrl":"https://doi.org/10.1080/19361610.2023.2283666","url":null,"abstract":"Intelligent systems, machine learning models, and artificial intelligence methods are increasing in complexity, and the integration of such technologies has also increased. However, the rise in the...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138504944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CSIMH: Design of an Efficient Security-Aware Customized Sidechaining Model via Iterative Meta-Heuristics","authors":"Nisha Balani, Pallavi Chavan","doi":"10.1080/19361610.2023.2264068","DOIUrl":"https://doi.org/10.1080/19361610.2023.2264068","url":null,"abstract":"AbstractBlockchains are a secure alternative for long-length data storage & security deployments. Though blockchains are unbounded, their quality of service (QoS) performance reduces after adding a certain number of blocks. Thus, sidechains have become essential for making the system decentralized, secure, and effective for use thereby improving their scalability & QoS performance. Sidechains reduce data storage and extraction delays. However, all sidechains of a single blockchain are the same in size, capacity, and security. This limits their application to real-world use cases that require dynamic security. To overcome this limitation, the authors propose a meta-heuristic approach to design a system that produces customized sidechains based on the quantity and quality of data stored on the chain. The model uses a machine-learning approach to find the best possible sidechain configuration for different data types. It makes the system fast and scalable and improves storage & memory efficiency. The proposed model is tested on multiple data sets and compared with various state-of-art sidechain deployments. An improvement of 18% in terms of mining speed, 27% in terms of energy efficiency, 10% with regards to throughput, and 8% concerning packet delivery ratio is observed. The model is tested under various attacks and faulty nodes to validate its security performance. A consistent QoS performance is observed for the proposed model under these attack types, thereby validating its resiliency for different attacks. This enhancement in performance makes the proposed model eligible for deployment in high-speed, low-energy, and high-security applications like IoT, mobile ad-hoc networks, and sensor networks.Keywords: Blockchainsidechainthroughputenergy consumptionQoSmeta-heuristic","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136295779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Susanto , D. Stiawan, Dian Palupi Rini, M. Arifin, Mohd Yazid Bin Idris, Nizar Alsharif, R. Budiarto
{"title":"Dimensional Reduction With Fast ICA for IoT Botnet Detection","authors":"Susanto , D. Stiawan, Dian Palupi Rini, M. Arifin, Mohd Yazid Bin Idris, Nizar Alsharif, R. Budiarto","doi":"10.1080/19361610.2022.2079906","DOIUrl":"https://doi.org/10.1080/19361610.2022.2079906","url":null,"abstract":"Abstract The Internet of Things (IoT) has unique characteristics with a minimalist design and has network access with great scalability, which makes it difficult to control access. Setting up an intrusion detection system (IDS) on an IoT system while taking into account its unique characteristics is a big challenge. In this paper, we propose a dimensional reduction approach utilizing the fast independent component analysis (ICA) method to address scalability issues of IDS for IoT systems. Experimental results show that the reduction of dimensions by the fast ICA method overall improves the IDS execution time and does not significantly affect accuracy.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44940991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Analysis of the Relationship between residents’ Perceived Probability of Property Victimization in Dwellings and the Level of Home Security Systems","authors":"Ingilab Shahbazov, Zaur Afandiyev, Ayshem Balayeva","doi":"10.1080/19361610.2023.2240305","DOIUrl":"https://doi.org/10.1080/19361610.2023.2240305","url":null,"abstract":"Using the dataset of the first nationwide victimization survey in Azerbaijan, the current paper analyzed whether home security systems have a relationship with the perceived probability of property crime victimization. The ordinal logistic regression analysis was employed. Examination of the distribution of security systems identified that dwelling type, residential location and income had a higher level of significance than the perceived risk of property crime victimization in predicting the level of security systems at home. As to the predictive capacity of security systems in relation to the perceived risk of property crime victimization, the former is statistically significant. Additionally, being a victim of property crime, residential location, age, and perceived neighborhood disorder level predicted the perceived risk of property crime victimization.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135420855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Politics of “Localised Legitimacy”, Vigilantism, Non-State Policing and Counter-Banditry in Northwest Nigeria: Evidence from the Epicenter","authors":"Folahanmi Aina","doi":"10.1080/19361610.2023.2240281","DOIUrl":"https://doi.org/10.1080/19361610.2023.2240281","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48296573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boris Šturc, Tatyana Gurova, N.I. Zelenkova, V. Shestak
{"title":"Developing a System of Indicators for Clustering Financial Cybercrime","authors":"Boris Šturc, Tatyana Gurova, N.I. Zelenkova, V. Shestak","doi":"10.1080/19361610.2021.2013112","DOIUrl":"https://doi.org/10.1080/19361610.2021.2013112","url":null,"abstract":"Abstract This study aims to propose a system of indicators for dividing financial cybercrime into groups. The results of this study indicate absence of taxonomic indicators regarding clustering of financial cybercrimes and wide differences in approaches to the development of such indicators in relation to cybercrimes. The proposed system of indicators for clustering of financial cybercrime is designed to help create a unified, consistent and holistic classification of cybercrime. The results of the study can be applied in the criminal legal classification of unlawful acts corresponding to the general concept of financial cybercrime.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44003249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transforming Pacifists into Warmongers? Separatist Movement, State Repression, and the Politics of Framing Terrorism in Nigeria: Evidence from IPOB and Yoruba Nation’s Freedom Frontiers","authors":"J. Ojo","doi":"10.1080/19361610.2023.2189867","DOIUrl":"https://doi.org/10.1080/19361610.2023.2189867","url":null,"abstract":"While the post-9/11 event has animated how state actors frame terrorism, contemporary studies have failed to address the politics inherent in proscribing, repressing, and labeling separatist movements as terrorists. This paper explores the politics of framing terrorism using the contemporary self-determination struggles advanced by the Indigenous People of Biafra (IPOB) and the Yoruba Nation ’ s freedom frontiers. The study proposes a United Nations-coordinated global framework for regulating and evaluating states ’ activities in identifying specific groups as terrorists. Taking such a stance would prevent aggrieved agitators from being persecuted by the state in the name of terror.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44305903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Natural Experiment of the Prince Hypothesis on Classroom Vandalism","authors":"William A. Chernoff","doi":"10.1080/19361610.2023.2169545","DOIUrl":"https://doi.org/10.1080/19361610.2023.2169545","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41753749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}